{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:44:34Z","timestamp":1773247474367,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030589226","type":"print"},{"value":"9783030589233","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58923-3_15","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T12:52:00Z","timestamp":1599742320000},"page":"220-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Does BERT Understand Code? \u2013 An Exploratory Study on the Detection of\u00a0Architectural Tactics in Code"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8899-7081","authenticated-orcid":false,"given":"Jan","family":"Keim","sequence":"first","affiliation":[]},{"given":"Angelika","family":"Kaplan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1593-3394","authenticated-orcid":false,"given":"Anne","family":"Koziolek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-6856","authenticated-orcid":false,"given":"Mehdi","family":"Mirakhorli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,8]]},"reference":[{"key":"15_CR1","unstructured":"Adhikari, A., Ram, A., Tang, R., Lin, J.: Docbert: BERT for document classification. arXiv (2019). http:\/\/arxiv.org\/abs\/1904.08398"},{"key":"15_CR2","unstructured":"Alon, U., Brody, S., Levy, O., Yahav, E.: code2seq: generating sequences from structured representations of code. In: ICLR (2019)"},{"issue":"10","key":"15_CR3","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE TSE 28(10), 970\u2013983 (2002). https:\/\/doi.org\/10.1109\/TSE.2002.1041053","journal-title":"IEEE TSE"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0164-1212(01)00061-9","volume":"59","author":"G Antoniol","year":"2001","unstructured":"Antoniol, G., Casazza, G., Di Penta, M., Fiutem, R.: Object-oriented design patterns recovery. J. Syst. Softw. 59(2), 181\u2013196 (2001)","journal-title":"J. Syst. Softw."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Babar, M.A., Gorton, I.: A tool for managing software architecture knowledge. In: 2nd SHARK\/ADI 2007 ICSE Workshops 2007, pp. 11\u201311. IEEE (2007)","DOI":"10.1109\/SHARK-ADI.2007.1"},{"key":"15_CR6","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice. Addison-Wesley Professional (2003)"},{"key":"15_CR7","unstructured":"Beltagy, I., Peters, M.E., Cohan, A.: Longformer: The long-document transformer. arXiv (2020). http:\/\/arxiv.org\/abs\/1904.08398"},{"issue":"5","key":"15_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1163514.1178644","volume":"31","author":"R Capilla","year":"2006","unstructured":"Capilla, R., Nava, F., P\u00e9rez, S., Due\u00f1as, J.C.: A web-based tool for managing architectural design decisions. ACM SIGSOFT 31(5), 4 (2006)","journal-title":"ACM SIGSOFT"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.asoc.2014.10.027","volume":"26","author":"A Chihada","year":"2015","unstructured":"Chihada, A., Jalili, S., Hasheminejad, S.M.H., Zangooei, M.H.: Source code and design conformance, design pattern detection from source code by classification approach. Appl. Soft Comput. 26, 357\u2013367 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"6","key":"15_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang, J., Berenbach, B., Clark, S., Settimi, R., Romanova, E.: Best practices for automated traceability. Computer 40(6), 27\u201335 (2007). https:\/\/doi.org\/10.1109\/MC.2007.195","journal-title":"Computer"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of Deep Bidirectional transformers for language understanding. In: NAACL-HLT (2019). https:\/\/doi.org\/10.18653\/v1\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"issue":"4","key":"15_CR12","first-page":"573","volume":"35","author":"S Ducasse","year":"2009","unstructured":"Ducasse, S., Pollet, D.: Software architecture reconstruction: a process-oriented taxonomy. IEEE TSE 35(4), 573\u2013591 (2009)","journal-title":"IEEE TSE"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Egyed, A., Biffl, S., Heindl, M., Gr\u00fcnbacher, P.: Determining the cost-quality trade-off for automated software traceability. In: 20th IEEE\/ACM ASE, pp. 360\u2013363. ACM, New York (2005). https:\/\/doi.org\/10.1145\/1101908.1101970","DOI":"10.1145\/1101908.1101970"},{"key":"15_CR14","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Elements of reusable object-oriented software. arXiv (1995)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Hey, T., Keim, J., Tichy, W.F., Koziolek, A.: NoRBERT: Transfer learning for requirements classification. In: 2020 IEEE 28th RE. IEEE (2020)","DOI":"10.1109\/RE48521.2020.00028"},{"issue":"9","key":"15_CR16","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1016\/j.jss.2010.11.909","volume":"84","author":"JF Hoorn","year":"2011","unstructured":"Hoorn, J.F., Farenhorst, R., Lago, P., Van Vliet, H.: The lonesome architect. J. Syst. Softw. 84(9), 1424\u20131435 (2011)","journal-title":"J. Syst. Softw."},{"key":"15_CR17","unstructured":"Howard, J., Ruder, S.: Fine-tuned language models for text classification. arXiv (2018). http:\/\/arxiv.org\/abs\/1801.06146"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Keim, J., Kaplan, A., Koziolek, A., Mirakhorli, M.: Gram21\/BERT4DAT, July 2020. https:\/\/doi.org\/10.5281\/zenodo.3925165","DOI":"10.5281\/zenodo.3925165"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Keim, J., Kaplan, A., Koziolek, A., Mirakhorli, M.: Using BERT for the detection of architectural tactics in code. Technical report 2, Karlsruhe Institute of Technology (KIT), Karlsruhe (2020). https:\/\/doi.org\/10.5445\/IR\/1000121031","DOI":"10.5445\/IR\/1000121031"},{"key":"15_CR20","unstructured":"Keskar, N.S., Mudigere, D., Nocedal, J., Smelyanskiy, M., Tang, P.T.P.: On large-batch training for deep learning: generalization gap and sharp minima. arXiv (2016). http:\/\/arxiv.org\/abs\/1609.04836"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Li, J., Wang, Y., Lyu, M.R., King, I.: Code completion with neural attention and pointer networks. 27th IJCAI, July 2018. https:\/\/doi.org\/10.24963\/ijcai.2018\/578","DOI":"10.24963\/ijcai.2018\/578"},{"key":"15_CR22","unstructured":"Loshchilov, I., Hutter, F.: Fixing weight decay regularization in adam. arXiv (2017). http:\/\/arxiv.org\/abs\/1711.05101"},{"issue":"3","key":"15_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TSE.2015.2479217","volume":"42","author":"M Mirakhorli","year":"2016","unstructured":"Mirakhorli, M., Cleland-Huang, J.: Detecting, tracing, and monitoring architectural tactics in code. IEEE Trans. Softw. Eng. 42(3), 205\u2013220 (2016). https:\/\/doi.org\/10.1109\/TSE.2015.2479217","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Mirakhorli, M., Shin, Y., Cleland-Huang, J., Cinar, M.: A tactic-centric approach for automating traceability of quality concerns. In: 34th ICSE, pp. 639\u2013649, June 2012. https:\/\/doi.org\/10.1109\/ICSE.2012.6227153","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Mirakhorli, M., Cleland-Huang, J.: Tracing architectural concerns in high assurance systems. In: 33rd ICSE, pp. 908\u2013911. ACM (2011)","DOI":"10.1145\/1985793.1985942"},{"key":"15_CR26","unstructured":"Mirakhorli, M., et al.: Archie. https:\/\/github.com\/SoftwareDesignLab\/Archie"},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Niven, T., Kao, H.Y.: Probing neural network comprehension of natural language arguments. In: 57th ACL (2019). https:\/\/doi.org\/10.18653\/v1\/P19-1459","DOI":"10.18653\/v1\/P19-1459"},{"issue":"9","key":"15_CR28","first-page":"1074","volume":"3","author":"L Prechelt","year":"1997","unstructured":"Prechelt, L.: Why we need an explicit forum for negative results. J. Univ. Comput. Sci. 3(9), 1074\u20131083 (1997)","journal-title":"J. Univ. Comput. Sci."},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Raychev, V., Vechev, M., Yahav, E.: Code completion with statistical language models. In: 35th ACM SIGPLAN PLDI, pp. 419\u2013428. New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2594291.2594321","DOI":"10.1145\/2594291.2594321"},{"key":"15_CR30","unstructured":"Sharma, T., Efstathiou, V., Louridas, P., Spinellis, D.: On the feasibility of transfer-learning code smells using deep learning. arXiv (2019). http:\/\/arxiv.org\/abs\/1904.03031"},{"key":"15_CR31","unstructured":"Sun, C., Qiu, X., Xu, Y., Huang, X.: How to fine-tune bert for text classification? arXiv (2019). http:\/\/arxiv.org\/abs\/1905.05583"},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Tenney, I., Das, D., Pavlick, E.: BERT rediscovers the classical NLP pipeline. In: 57th ACL, pp. 4593\u20134601. ACL, Florence, Italy, July 2019. https:\/\/doi.org\/10.18653\/v1\/P19-1452","DOI":"10.18653\/v1\/P19-1452"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58923-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T17:44:35Z","timestamp":1617212675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58923-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030589226","9783030589233"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58923-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L'Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecsa2020.disim.univaq.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic ECSA 2020 was held as a virtual event. ECSA 2020 Tracks and Workshops information: single-blind review, submissions: 72, full papers accepted: 30, short papers accepted: 9.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}